McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Animation SY (BSC [animation]) , Bachelor of Science in Animation (BSc animation) .
101. |
When you use the word ______it means you are protecting your data from getting disclosed. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | availability |
Answer» A. confidentiality |
102. |
_______ means the protection of data from modification by unknown users. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | non-repudiation |
Answer» B. integrity |
103. |
_______ of information means, only authorized users are capable of accessing the information. |
A. | confidentiality |
B. | integrity |
C. | non-repudiation |
D. | availability |
Answer» D. availability |
104. |
This helps in identifying the origin of information and authentic user. This referred to here as __________ |
A. | confidentiality |
B. | integrity |
C. | authenticity |
D. | availability |
Answer» C. authenticity |
105. |
Data ___________ is used to ensure confidentiality. |
A. | encryption |
B. | locking |
C. | decryption |
D. | backup |
Answer» A. encryption |
106. |
What does OSI stand for in the OSI Security Architecure? |
A. | open system interface |
B. | open systems interconnections |
C. | open source initiative |
D. | open standard interconnections |
Answer» B. open systems interconnections |
107. |
A company requires its users to change passwords every month. This improves the ________ of the network. |
A. | performance |
B. | reliability |
C. | security |
D. | none of the above |
Answer» C. security |
108. |
Release of message contents and Traffic analysis are two types of _________ attacks. |
A. | active attack |
B. | modification of attack |
C. | passive attack |
D. | dos attack |
Answer» C. passive attack |
109. |
The ________ is encrypted text. |
A. | cipher scricpt |
B. | cipher text |
C. | secret text |
D. | secret script |
Answer» B. cipher text |
110. |
What type of attack uses a fraudulent server with a relay address? |
A. | ntlm |
B. | mitm |
C. | netbios |
D. | smb |
Answer» B. mitm |
111. |
Which of the following Algorithms not belong to symmetric encryption |
A. | 3des (tripledes) |
B. | rsa |
C. | rc5 |
D. | idea |
Answer» B. rsa |
112. |
Which is the largest disadvantage of the symmetric Encryption? |
A. | more complex and therefore more time-consuming calculations. |
B. | problem of the secure transmission of the secret key. |
C. | less secure encryption function. |
D. | isn\t used any more. |
Answer» B. problem of the secure transmission of the secret key. |
113. |
In cryptography, what is cipher? |
A. | algorithm for performing encryption and decryption |
B. | encrypted message |
C. | both algorithm for performing encryption and decryption and encrypted message |
D. | decrypted message |
Answer» A. algorithm for performing encryption and decryption |
114. |
In asymmetric key cryptography, the private key is kept by __________ |
A. | sender |
B. | receiver |
C. | sender and receiver |
D. | all the connected devices to the network |
Answer» B. receiver |
115. |
Which one of the following algorithm is not used in asymmetric-key cryptography? |
A. | rsa algorithm |
B. | diffie-hellman algorithm |
C. | electronic code book algorithm |
D. | dsa algorithm |
Answer» C. electronic code book algorithm |
116. |
In cryptography, the order of the letters in a message is rearranged by __________ |
A. | transpositional ciphers |
B. | substitution ciphers |
C. | both transpositional ciphers and substitution ciphers |
D. | quadratic ciphers |
Answer» A. transpositional ciphers |
117. |
What is data encryption standard (DES)? |
A. | block cipher |
B. | stream cipher |
C. | bit cipher |
D. | byte cipher |
Answer» A. block cipher |
118. |
A asymmetric-key (or public key ) cipher uses |
A. | 1 key |
B. | 2 key |
C. | 3 key |
D. | 4 key |
Answer» B. 2 key |
119. |
In asymmetric key cryptography, the two keys e and d, have special relationship to |
A. | others |
B. | data |
C. | keys |
D. | each other |
Answer» D. each other |
120. |
_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa. |
A. | malware analysis |
B. | exploit writing |
C. | reverse engineering |
D. | cryptography |
Answer» D. cryptography |
121. |
______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it. |
A. | malware analysis |
B. | cryptography |
C. | reverse engineering |
D. | exploit writing |
Answer» B. cryptography |
122. |
Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data. |
A. | secret key |
B. | external programs |
C. | add-ons |
D. | secondary key |
Answer» A. secret key |
123. |
Conventional cryptography is also known as _____________ or symmetric-key encryption. |
A. | secret-key |
B. | public key |
C. | protected key |
D. | primary key |
Answer» A. secret-key |
124. |
The procedure to add bits to the last block is termed as _________________ |
A. | decryption |
B. | hashing |
C. | tuning |
D. | padding |
Answer» D. padding |
125. |
How many rounds does the AES-192 perform? |
A. | 10 |
B. | 12 |
C. | 14 |
D. | 16 |
Answer» B. 12 |
126. |
ECC encryption system is __________ |
A. | symmetric key encryption algorithm |
B. | asymmetric key encryption algorithm |
C. | not an encryption algorithm |
D. | block cipher method |
Answer» B. asymmetric key encryption algorithm |
127. |
________function creates a message digest out of a message. |
A. | encryption |
B. | decryption |
C. | hash |
D. | none of the above |
Answer» C. hash |
128. |
Extensions to the X.509 certificates were added in version ____ |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» C. 3 |
129. |
A digital signature needs ____ system |
A. | symmetric-key |
B. | asymmetric-key |
C. | either (a) or (b) |
D. | neither (a) nor (b) |
Answer» B. asymmetric-key |
130. |
“Elliptic curve cryptography follows the associative property.” |
A. | true |
B. | false |
Answer» A. true |
131. |
ECC stands for |
A. | elliptic curve cryptography |
B. | enhanced curve cryptography |
C. | elliptic cone cryptography |
D. | eclipse curve cryptography |
Answer» A. elliptic curve cryptography |
132. |
When a hash function is used to provide message authentication, the hash function value is referred to as |
A. | message field |
B. | message digest |
C. | message score |
D. | message leap |
Answer» D. message leap |
133. |
Message authentication code is also known as |
A. | key code |
B. | hash code |
C. | keyed hash function |
D. | message key hash function |
Answer» C. keyed hash function |
134. |
The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key. |
A. | true |
B. | false |
Answer» B. false |
135. |
The DSS signature uses which hash algorithm? |
A. | md5 |
B. | sha-2 |
C. | sha-1 |
D. | does not use hash algorithm |
Answer» C. sha-1 |
136. |
What is the size of the RSA signature hash after the MD5 and SHA-1 processing? |
A. | 42 bytes |
B. | 32 bytes |
C. | 36 bytes |
D. | 48 bytes |
Answer» C. 36 bytes |
137. |
In the handshake protocol which is the message type first sent between client and server ? |
A. | server_hello |
B. | client_hello |
C. | hello_request |
D. | certificate_request |
Answer» B. client_hello |
138. |
One commonly used public-key cryptography method is the ______ algorithm. |
A. | rss |
B. | ras |
C. | rsa |
D. | raa |
Answer» C. rsa |
139. |
he ________ method provides a one-time session key for two parties. |
A. | diffie-hellman |
B. | rsa |
C. | des |
D. | aes |
Answer» A. diffie-hellman |
140. |
The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other. |
A. | man-in-the-middle |
B. | ciphertext attack |
C. | plaintext attack |
D. | none of the above |
Answer» A. man-in-the-middle |
141. |
1. VPN is abbreviated as __________ |
A. | visual private network |
B. | virtual protocol network |
C. | virtual private network |
D. | virtual protocol networking |
Answer» C. virtual private network |
142. |
__________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network. |
A. | visual private network |
B. | virtual protocol network |
C. | virtual protocol networking |
D. | virtual private network |
Answer» D. virtual private network |
143. |
Which of the statements are not true to classify VPN systems? |
A. | protocols used for tunnelling the traffic |
B. | whether vpns are providing site-to-site or remote access connection |
C. | securing the network from bots and malwares |
D. | levels of security provided for sending and receiving data privately |
Answer» C. securing the network from bots and malwares |
144. |
What types of protocols are used in VPNs? |
A. | application level protocols |
B. | tunnelling protocols |
C. | network protocols |
D. | mailing protocols |
Answer» A. application level protocols |
145. |
VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network. |
A. | true |
B. | false |
Answer» A. true |
146. |
There are _________ types of VPNs. |
A. | 3 |
B. | 2 |
C. | 5 |
D. | 4 |
Answer» B. 2 |
147. |
_________ type of VPNs are used for home private and secure connectivity. |
A. | remote access vpns |
B. | site-to-site vpns |
C. | peer-to-peer vpns |
D. | router-to-router vpns |
Answer» A. remote access vpns |
148. |
Which types of VPNs are used for corporate connectivity across companies residing in different geographical location? |
A. | remote access vpns |
B. | site-to-site vpns |
C. | peer-to-peer vpns |
D. | country-to-country vpns |
Answer» B. site-to-site vpns |
149. |
Site-to-Site VPN architecture is also known as _________ |
A. | remote connection based vpns |
B. | peer-to-peer vpns |
C. | extranet based vpn |
D. | country-to-country vpns |
Answer» C. extranet based vpn |
150. |
There are ________ types of VPN protocols. |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 6 |
Answer» D. 6 |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.